Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2014-1985

Опубликовано: 12 дек. 2014
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2014-1985: bind97 security update (IMPORTANT)

[32:9.7.0-21.P2.1]

  • Fix CVE-2014-8500 (#1171972)

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

bind97

9.7.0-21.P2.el5_11.1

bind97-chroot

9.7.0-21.P2.el5_11.1

bind97-devel

9.7.0-21.P2.el5_11.1

bind97-libs

9.7.0-21.P2.el5_11.1

bind97-utils

9.7.0-21.P2.el5_11.1

Oracle Linux x86_64

bind97

9.7.0-21.P2.el5_11.1

bind97-chroot

9.7.0-21.P2.el5_11.1

bind97-devel

9.7.0-21.P2.el5_11.1

bind97-libs

9.7.0-21.P2.el5_11.1

bind97-utils

9.7.0-21.P2.el5_11.1

Oracle Linux i386

bind97

9.7.0-21.P2.el5_11.1

bind97-chroot

9.7.0-21.P2.el5_11.1

bind97-devel

9.7.0-21.P2.el5_11.1

bind97-libs

9.7.0-21.P2.el5_11.1

bind97-utils

9.7.0-21.P2.el5_11.1

Связанные CVE

Связанные уязвимости

ubuntu
больше 10 лет назад

ISC BIND 9.0.x through 9.8.x, 9.9.0 through 9.9.6, and 9.10.0 through 9.10.1 does not limit delegation chaining, which allows remote attackers to cause a denial of service (memory consumption and named crash) via a large or infinite number of referrals.

redhat
больше 10 лет назад

ISC BIND 9.0.x through 9.8.x, 9.9.0 through 9.9.6, and 9.10.0 through 9.10.1 does not limit delegation chaining, which allows remote attackers to cause a denial of service (memory consumption and named crash) via a large or infinite number of referrals.

nvd
больше 10 лет назад

ISC BIND 9.0.x through 9.8.x, 9.9.0 through 9.9.6, and 9.10.0 through 9.10.1 does not limit delegation chaining, which allows remote attackers to cause a denial of service (memory consumption and named crash) via a large or infinite number of referrals.

debian
больше 10 лет назад

ISC BIND 9.0.x through 9.8.x, 9.9.0 through 9.9.6, and 9.10.0 through ...

github
больше 3 лет назад

ISC BIND 9.0.x through 9.8.x, 9.9.0 through 9.9.6, and 9.10.0 through 9.10.1 does not limit delegation chaining, which allows remote attackers to cause a denial of service (memory consumption and named crash) via a large or infinite number of referrals.